March 20, 2014
Spotting unusual network traffic, like large amounts of encrypted data headed to suspicious domains, is key to better banking botnet detection.
January 14, 2014
A report from NSS Labs details the latest updates to financial malware, with criminal crews focused on hiding communications, localization.
Botnet Get Started
Bring yourself up to speed with our introductory content
An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes. Continue Reading
Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down. Continue Reading
A zombie army (also known as a botnet) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers on the Internet... (Continued) Continue Reading
Evaluate Botnet Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn to apply best practices and optimize your operations.
Expert Nick Lewis examines the reemergence of the PushDo botnet and its new domain generation algorithm capabilities, and the threats it poses. Continue Reading
Problem Solve Botnet Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Nick Lewis offers advice on detecting a particular strand of malware that utilizes a Java backdoor to enable botnet communication. Continue Reading
Though botnet mitigation tactics continue to mature, so do the botnets themselves. In this tip, expert Nick Lewis gives best practices for detecting and removing cutting edge botnets. Continue Reading
Got bots? Hopefully not, but how can you be sure? Learn about botnet detection with the help of a free tool, BotHunter. This can keep your computers from participating in a botnet and subsequently leaking data. Continue Reading